lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <171459363249.6729.10986328345003471376.git-patchwork-notify@kernel.org>
Date: Wed, 01 May 2024 20:00:32 +0000
From: patchwork-bot+bluetooth@...nel.org
To: Johan Hovold <johan+linaro@...nel.org>
Cc: marcel@...tmann.org, luiz.dentz@...il.com, quic_janathot@...cinc.com,
 linux-bluetooth@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/5] Bluetooth: qca: info leak fixes and cleanups

Hello:

This series was applied to bluetooth/bluetooth-next.git (master)
by Luiz Augusto von Dentz <luiz.von.dentz@...el.com>:

On Wed,  1 May 2024 14:34:51 +0200 you wrote:
> Here are two fixes for potential info leaks in the QCA driver and a few
> cleanups.
> 
> All of these can go into 6.10.
> 
> Johan
> 
> [...]

Here is the summary with links:
  - [1/5] Bluetooth: qca: fix info leak when fetching fw build id
    https://git.kernel.org/bluetooth/bluetooth-next/c/cfc2a7747108
  - [2/5] Bluetooth: qca: fix info leak when fetching board id
    https://git.kernel.org/bluetooth/bluetooth-next/c/3e2faecb09fb
  - [3/5] Bluetooth: qca: drop bogus edl header checks
    https://git.kernel.org/bluetooth/bluetooth-next/c/ca8934466039
  - [4/5] Bluetooth: qca: drop bogus module version
    https://git.kernel.org/bluetooth/bluetooth-next/c/2684457bf2dd
  - [5/5] Bluetooth: qca: clean up defines
    https://git.kernel.org/bluetooth/bluetooth-next/c/f50efbe27afd

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ